{"entities":{"Q690307":{"pageid":692156,"ns":120,"title":"Item:Q690307","lastrevid":63512670,"modified":"2026-04-11T13:40:28Z","type":"item","id":"Q690307","labels":{"en":{"language":"en","value":"Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 448535"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q690307$A8FB7111-F071-4FFE-9149-A63890F88A01","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"f741c41274523ddee8facdf562e4ce8a64f155be","datavalue":{"value":{"text":"Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q690307$5A666445-EF19-4468-8175-19EBDAAC1788","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"0d712410627af397511ca72d3396710145a04320","datavalue":{"value":"0801.00055","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$D5B4F43A-06F6-4376-9839-D729F6DE6BEA","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"7ccadac93655f861dde9d556a881ad01e1de9425","datavalue":{"value":"10.1007/3-540-57332-1","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$97166A53-F769-47FF-82C9-1596DD0BFA86","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q690307$A37E79A0-21FB-4081-9DE8-1B3EB486F645","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"99da8031c43322c13e168b16d1a7c0565473a968","datavalue":{"value":{"time":"+1993-11-18T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q690307$12E1DE36-342D-458E-9A56-42346D3E63BC","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"53c6817a6dddc2c3df275abc7932496d245e2ee8","datavalue":{"value":"The articles of this volume will be reviewed individually.  Indexed articles:  \\textit{Davies, Donald W.}, The transition from mechanisms to electronic computers, 1940 to 1950, 1-21 [Zbl 0814.01012]  \\textit{Knudsen, Lars Ramkilde}, Cryptanalysis of LOKI, 22-35 [Zbl 0809.94013]  \\textit{Brown, Lawrence; Kwan, Matthew; Pieprzyk, Josef; Seberry, Jennifer}, Improving resistance to differential cryptanalysis and the redesign of LOKI, 36-50 [Zbl 0806.94015]  \\textit{Miyano, Hiroshi}, A method to estimate the number of ciphertext pairs for differential cryptanalysis, 51-58 [Zbl 0806.94014]  \\textit{Kim, Kwangjo}, Construction of DES-like S-boxes based on Boolean functions satisfying the SAC, 59-72 [Zbl 0806.94019]  \\textit{Yang, Jun-Hui; Dai, Zong-Duo; Zeng, Ken-Cheng}, The database of selected permutations. (Extended abstract), 73-81 [Zbl 0938.68613]  \\textit{Daemen, Joan; Govaerts, Ren\u00e9; Vandewalle, Joos}, A framework for the design of one-way hash functions including cryptanalysis of Damg\u00e5rd's one-way function based on a cellular automaton, 82-96 [Zbl 0937.94507]  \\textit{Sadeghiyan, Babak; Zheng, Yuliang; Pieprzyk, Josef}, How to construct a family of strong one way permutations, 97-110 [Zbl 0806.94017]  \\textit{Zheng, Yuliang; Hardjono, Thomas; Pieprzyk, Josef}, Sibling intractable function families and their applications. (Extended abstract), 124-138 [Zbl 0805.94015]  \\textit{Ohta, Kazuo; Okamoto, Tatsuaki}, A digital multisignature scheme based on the Fiat-Shamir scheme, 139-148 [Zbl 0808.94020]  \\textit{Lin, Hung-Yu; Harn, Lein}, A generalized secret sharing scheme with cheater detection, 149-158 [Zbl 0808.94019]  \\textit{Laih, Chi Sung; Harn, Lein}, Generalized threshold cryptosystems, 159-166 [Zbl 0808.94022]  \\textit{Safavi-Naini, Reihaneh}, Feistel type authentication codes, 167-178 [Zbl 0806.94018]  \\textit{Rhee, Man Y.}, Research activities on cryptology in Korea, 179-193 [Zbl 0806.94022]  \\textit{Sadeghiyan, Babak; Pieprzyk, Josef}, On necessary and sufficient conditions for the construction of super pseudorandom permutations, 194-209 [Zbl 0808.94025]  \\textit{Even, Shimon; Mansour, Yishay}, A construction of a cipher from a single pseudorandom permutation, 210-224 [Zbl 0808.94024]  \\textit{Pieprzyk, Josef; Sadeghiyan, Babak}, Optimal perfect randomizers, 225-236 [Zbl 0808.94026]  \\textit{Kwan, Matthew; Pieprzyk, Josef}, A general purpose technique for locating key scheduling weaknes in DES- like cryptosystems. (Extended abstract), 237-246 [Zbl 0825.94204]  \\textit{Morita, Hikaru; Ohta, Kazuo; Miyaguchi, Shoji}, Results of switching-closure-test on FEAL, 247-252 [Zbl 0825.94193]  \\textit{Shimbo, Atsushi; Kawamura, Shin-ichi}, Cryptanalysis of several conference key distribution schemes, 265-276 [Zbl 0809.94012]  \\textit{Klapper, Andrew; Goresky, Mark}, Revealing information with partial period correlations. (Extended abstract), 277-287 [Zbl 0809.94011]  \\textit{Meijers, Joost; van Tilburg, Johan}, Extended majority voting and private-key algebraic-code encryptions, 288-298 [Zbl 0808.94016]  \\textit{Goldburg, B.; Dawson, E.; Sridharan, S.}, A secure analog speech scrambler using the discrete cosine transform, 299-311 [Zbl 0825.94178]  \\textit{Harn, Lein; Lin, Hung-Yu}, An oblivious transfer protocol and its application for the exchange of secrets, 312-320 [Zbl 0938.68630]  \\textit{Saito, Takeshi; Kurosawa, Kaoru; Sakurai, Kouichi}, 4 move perfect ZKIP of knowledge with no assumption, 321-330 [Zbl 0938.68635]  \\textit{Itoh, Toshiya; Sakurai, Kouichi}, On the complexity of constant round ZKIP of possession of knowledge, 331-345 [Zbl 0938.68634]  \\textit{Fortnow, Lance; Szegedy, Mario}, On the power of two-local random reductions, 346-351 [Zbl 0823.68035]  \\textit{Feigenbaum, Joan; Ostrovsky, Rafail}, A note on one-prover, instance-hiding zero-knowledge proof systems. (Extended abstract), 352-359 [Zbl 0805.68060]  \\textit{Desmedt, Yvo; Burmester, Mike}, An efficient zero-knowledge scheme for the discrete logarithm based on smooth numbers, 360-367 [Zbl 0938.68636]  \\textit{Okamoto, Tatsuaki}, An extension of zero-knowledge proofs and its applications, 368-381 [Zbl 0938.68629]  \\textit{Itoh, Toshiya; Sakurai, Kouichi; Shizuya, Hiroki}, Any language in IP has a divertible ZKIP, 382-396 [Zbl 0938.68631]  \\textit{Shu, Chaosheng; Matsumoto, Tsutomu; Imai, Hideki}, A multi-purpose proof system -- for identity and membership proofs, 397-411 [Zbl 0816.94019]  \\textit{Toussaint, Marie-Jeanne}, Formal verification of probabilistic properties in cryptographic protocols. (Extended abstract), 412-426 [Zbl 0809.94020]  \\textit{Rivest, Ronald L.}, Cryptography and machine learning, 427-439 [Zbl 0806.94021]  \\textit{Brandt, J\u00f8rgen; Damg\u00e5rd, Ivan; Landrock, Peter}, Speeding up prime number generation, 440-449 [Zbl 0816.11068]  \\textit{Laih, Chi-Sung; Yen, Sung-Ming; Harn, Lein}, Two efficient server-aided secret computation protocols based on the addition sequence, 450-459 [Zbl 0825.68375]  \\textit{Miyaji, Atsuko}, On ordinary elliptic curve cryptosystems, 460-469 [Zbl 0806.94012]  \\textit{Joux, Antoine; Stern, Jacques}, Cryptanalysis of another knapsack cryptosystem, 470-476 [Zbl 0808.94017]  \\textit{Daemen, Joan; Bosselaers, Antoon; Govaerts, Ren\u00e9; Vandewalle, Joos}, Collisions for Schnorr's hash function FFT-hash presented at Crypto '91, 477-480 [Zbl 0808.94018]  \\textit{Rivest, Ronald L.}, On NIST's proposed digital signature standard, 481-484 [Zbl 0825.94191]  \\textit{Kaneko, Toshinobu}, A known-plaintext attack of FEAL-4 based on the system of linear equations on difference. (Extended abstract), 485-488 [Zbl 0825.94201]  \\textit{Kwan, Matthew}, Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption), 489-492 [Zbl 0825.94203]  \\textit{Daemen, Joan}, Limitations of the Even-Mansour construction, 495-498 [Zbl 0825.94187]","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$2DF9DC31-685D-402A-B812-30880DEA0814","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$D2D5114A-4F8E-436D-A30B-1CA1BD1D0296","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"8dc5d8f03fcaaa9e07fb2b90c65b675a74eb1ab2","datavalue":{"value":"94-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$B40E8F9E-0FBE-4DC4-974E-BD8684C37F0F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$8F5C64A3-6851-429D-97F7-8157320048EE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$AF197063-BC86-4604-8B86-BDA46D8A3939","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"fd3f3e5dc85f5cae503ebfc6fb61c33d3a4bfccf","datavalue":{"value":"448535","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$76C8C2DB-096B-47B7-B635-692CE8AFC215","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"25f02e4e31869dda1f59bc308465c3029f601442","datavalue":{"value":"Fujiyoshida (Japan)","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$435050B5-5991-46BF-A90C-CA02202CEEF7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5d83ae477e518ffecea78688f13a2aaaeca13299","datavalue":{"value":"Conference","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$B4FDD881-E47D-4AAD-BC02-F02B256F82EB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"5c4c4bb5a86a0fdf66f908b603f2f6975f5ef6fc","datavalue":{"value":"Proceedings","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$B14E4B11-D7D4-4FE8-844C-1B190221F5B6","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"7d7dae2ca8feac2a167571a9ab2be30f165293bd","datavalue":{"value":"ASIACRYPT '91","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$1E3CC9EC-82F2-461B-9F62-73FD6BEAD9D3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"9444c7e81fc487ab48d60d555be7e74462154789","datavalue":{"value":"Cryptology","type":"string"},"datatype":"string"},"type":"statement","id":"Q690307$7C8E5692-76D9-4802-8487-C8B6A4B30FFD","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q690307$021EB070-4C5D-40F4-BD61-8E5EA0CBE1A6","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"2e44332415e68bba571bb8bceb8e7becfc77f4e5","datavalue":{"value":"https://doi.org/10.1007/3-540-57332-1","type":"string"},"datatype":"url"},"type":"statement","id":"Q690307$323DC1CA-3083-447C-952F-B3177C25012A","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"972c816d738cdfaa6a31baab14c5f4f4455e7f1a","datavalue":{"value":"W2496460919","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q690307$58E857DB-8900-45F4-B394-BEFE3F0BC518","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Advances in Cryptology - ASIACRYPT '91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11--14, 1991. Proceedings","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Advances_in_Cryptology_-_ASIACRYPT_%2791._International_conference_on_the_theory_and_application_of_cryptology,_Fujiyoshida,_Japan,_November_11--14,_1991._Proceedings"}}}}}